282 Followers
400 Following
14 Posts
Oh no, not again.
@saelo "I want to get everyone on the same page"
Is that a good idea in a heap sandbox?
Ham wir noch Tabs?
Gar keine mehr?
Wer hat die letzten geschlossen?!
Mein Browser hat öfter mit Tabs zu tun, privat aber.
@danimo offtopic is the new ontopic!

Customer's project analysis: "A 3-node cluster is not possible because of network limitations (an ethernet cable only has two ends!)"

Long story short: To prove a point, I built a twisted-pair Ethernet "cable" with 3 ends. I've only gotten it to work with 10BASE-T and autonegotiation disabled though.

New research 👉 Exception Oriented Programming, Part 2: Weaponizing Fundamental Weaknesses in Exception Unwinding to Gain Code Execution https://billdemirkapi.me/abusing-exceptions-for-code-execution-part-2/
Abusing Exceptions for Code Execution, Part 2

In this article, we'll explore how the concepts behind Exception Oriented Programming can be abused when exploiting stack overflow vulnerabilities on Windows.

Bill Demirkapi's Blog

Disclosing CHOP, aka how attackers can bypass commodity return address protections such as stack cookies by hijacking the exception handling process. Paper to appear NDSS'23, fetch our preprint here: https://download.vusec.net/papers/chop_ndss23.pdf! Joint work of Victor Duta, Fabian Freyer, @pagabuc, @nsr, and @c_giuffrida.

Code and data available at: https://github.com/chop-project/chop.

YAML YAML YAML i got love in my TOML
and I feel like a-JSON you

Interested in smashing stacks or binary exploitation in general? In case you attend Backhat Europe next week, feel free to checkout Victors's and Fabian's talk "Unwinding the Stack for Fun and Profit" next Wednesday.

They will present our work on confusing the unwinder and bending exception handling for exploitation.

More info at: https://www.blackhat.com/eu-22/briefings/schedule/index.html#unwinding-the-stack-for-fun-and-profit-29449

Black Hat

Black Hat

@runasand tbf, if Apple wouldn't have rolled that out first in China, I'd have thought "great, that's a pretty neat attack surface reduction", given AWDL had a couple of bad vulnerabilities in the past. However, pushing it there first, I'm questioning the motivation. I'm curious if AirDrop is as a censorship-resistant peer-to-peer sneakernet elsewhere?
here are some examples: inv_1, inv_4, buf_1, sdffq_1